Grade 9 Exam  >  Grade 9 Notes  >  Computer Science for Grade 9  >  Worksheet: Cyber Safety

Worksheet: Cyber Safety | Computer Science for Grade 9 PDF Download

Q.1. Fill in the blanks with the given words.
(i) Unsolicited commercial email is called _______.
(ii) A _______ is a piece of code which is capable of replicating itself and typically has a detrimental effect, such as corrupting the system or destroying data.
(iii) The default privacy settings in social networking site is _______.
(iv) _______ of information is defined as information to which the public does not have general access.
(v) An _______ process, ensures that authorized users are assigned confidential user identification and passwords.

(vi) _______ your computer and smartphone with strong, up-to-date security/anti-malware software.
(vii) _______ Information is submitted voluntarily in social networking sites.
(viii) _______refers to assigning a keyword or phrase that describes the theme of a group of articles, photos, videos, or other types of media files in social networking sites.
(ix) _______ is a crime in which the attacker harasses a victim using electronic communication.
(x) A _______ is a broad term used to describe all sorts of unwanted or malicious code.

Q.2. State whether the following statements are True (T) or False (F).
(i) Computer “virus” is a program which is developed by humans whose malicious intents is to disrupt the normal activity that can be done using a computer. 
(ii) Worms are usually parasitic in nature. 
(iii) Privacy is used to verify that a user sending a message is who he or she claims to be, and to provide the receiver with the means to encode a reply. 
(iv) Confidentiality of information is is defined as information to which you do not have general access. 
(v) Facebook is a malware. 
(vi) A virus can spread if you are using an infected media like Pen drives, CD, DVD, etc, which may have itself got infected from some other computer. 
(vii) Macro viruses infects files with .exe extension. 
(viii) Identity protection refers to the protection of personally identifiable information.
(ix) Cyber safety refers to safe and responsible use of Information and Communication Technologies (ICT).
(x) Polymorphic viruses have the capability of changing itself after infecting a computer.

You can access the solutions to this worksheet here.

The document Worksheet: Cyber Safety | Computer Science for Grade 9 is a part of the Grade 9 Course Computer Science for Grade 9.
All you need of Grade 9 at this link: Grade 9
51 videos|44 docs|9 tests

FAQs on Worksheet: Cyber Safety - Computer Science for Grade 9

1. What are some basic cyber safety tips for individuals?
Ans. Basic cyber safety tips include using strong and unique passwords for different accounts, enabling two-factor authentication, being cautious about the information shared on social media, regularly updating software and security programs, and avoiding clicking on suspicious links or downloading unknown attachments.
2. How can I recognize phishing attempts?
Ans. Phishing attempts can often be recognized by poor grammar or spelling in emails, requests for personal information, suspicious email addresses that don't match the sender's name, and urgent language that pressures you to act quickly. It's essential to verify the source before responding or clicking on links.
3. What steps should I take if I believe my personal data has been compromised?
Ans. If you believe your personal data has been compromised, immediately change your passwords, enable two-factor authentication, monitor your financial accounts for unauthorized transactions, report the incident to relevant authorities, and consider placing a fraud alert on your credit report.
4. Why is it important to use a VPN when accessing public Wi-Fi?
Ans. Using a VPN (Virtual Private Network) when accessing public Wi-Fi is important because it encrypts your internet connection, protecting your data from hackers who may be monitoring the network. It adds an extra layer of security, making it more difficult for cybercriminals to access your personal information.
5. What are the consequences of not practicing good cyber safety?
Ans. The consequences of not practicing good cyber safety can include identity theft, financial loss, unauthorized access to personal accounts, loss of sensitive data, and potential legal ramifications. Poor cyber hygiene can expose individuals and organizations to significant risks, making them prime targets for cyber attacks.
Related Searches

shortcuts and tricks

,

Worksheet: Cyber Safety | Computer Science for Grade 9

,

Exam

,

MCQs

,

ppt

,

Worksheet: Cyber Safety | Computer Science for Grade 9

,

practice quizzes

,

Viva Questions

,

Worksheet: Cyber Safety | Computer Science for Grade 9

,

Summary

,

video lectures

,

Previous Year Questions with Solutions

,

pdf

,

Semester Notes

,

Sample Paper

,

study material

,

mock tests for examination

,

Objective type Questions

,

Extra Questions

,

past year papers

,

Important questions

,

Free

;